Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security system and method based on user-intended final destination

Active Publication Date: 2019-06-11
WOOD MICHAEL C
View PDF13 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text discusses a way to deal with redirects on websites that go to different domains. It suggests that some redirects, like those within the same domain, can be treated as safe and can be followed. Additionally, the text explains how the final destination can be determined based on different calculations, and how to use this information to protect user privacy and prevent malicious redirects. The technical effect of this invention is to enhance website security and protect user privacy from hacks and email marketing services.

Problems solved by technology

This technique keeps the first security method (blacklists) continually out of date, and therefore, ineffective.
This makes the security method not only ineffective, but even harmful.
The inherent weaknesses of the first two methods led to the current state-of-the-art security method: link scanning.
Unfortunately, link scanning solely provides the illusion of security while being trivial for hackers to circumvent.
Thus, the security service renders the link “good”; the user trusts the “good” rating, and then proceeds to get hacked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security system and method based on user-intended final destination
  • Computer security system and method based on user-intended final destination
  • Computer security system and method based on user-intended final destination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079]One sample embodiment is best understood by reference to the detailed drawings and description set forth herein. Embodiments of the invention are discussed below with reference to the drawings; however, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments. For example, in light of the teachings of the present invention, those skilled in the art will recognize a multiplicity of alternate and suitable approaches, depending upon the needs of the particular application, to implement the functionality of any given detail described herein beyond the particular implementation choices in the following embodiments described and shown. That is, numerous modifications and variations of the invention may exist that are too numerous to be listed but that all fit within the scope of the invention. Also, singular words should be read as pl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method is described for protecting applications against malicious URL links by identifying a final destination. The system and method also includes enabling a user process to directly connect to the final destination, bypassing the original URL altogether; thereby bypassing the hacker's ability to use that URL to programmatically send the application to a malicious site.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority from and is: (i) a nonprovisional application and continuation-in-part of U.S. nonprovisional patent application Ser. No. 16 / 116,386 filed on Aug. 29, 2018, which is a nonprovisional of and claims priority from U.S. provisional patent application Ser. No. 62 / 552,238 filed on Aug. 30, 2017, and is a continuation-in-part nonprovisional application of and claims priority from U.S. nonprovisional patent application Ser. No. 15 / 429,073 filed on Feb. 9, 2017, which is a nonprovisional of and claims priority from the following: U.S. provisional patent application Ser. No. 62 / 295,315 filed on Feb. 15, 2016, U.S. provisional patent application Ser. No. 62 / 314,225 filed on Mar. 28, 2016, U.S. provisional patent application Ser. No. 62 / 328,912 filed on Apr. 28, 2016, U.S. provisional patent application Ser. No. 62 / 348,518 filed on Jun. 10, 2016, U.S. provisional patent application Ser. No. 62 / 350,556 filed on Jun. 15...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12H04L29/08H04L12/721
CPCH04L63/0227H04L45/66H04L61/2038H04L61/2069H04L61/6022H04L63/101H04L63/1408H04L67/12H04L63/0236H04L67/02H04L61/1511H04L63/168H04L61/4511H04L61/5038H04L61/5069H04L2101/622
Inventor WOOD, MICHAEL C.
Owner WOOD MICHAEL C
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products